TOPIC: Checkpoints.
DISCUSSION: Checkpoints are often scenes of violence or have the threat of violence. Leaders must take this into consideration when preparing personnel to man checkpoints. The rules of engagement must be clear, but flexible to accommodate rapid changes in any situation that may develop. During Operation PROVIDE COMFORT in northern Iraq, one type of checkpoint used was called a "flying checkpoint." Mobile units, usually consisting of truck-mounted infantry, combat engineers, and TOW vehicles overwatched by attack helicopters, would move forward to key intersections in areas where armed Iraqi or guerrilla fighters were known to operate and would set up hasty roadblocks to disrupt unauthorized or unwanted military activity. This mission always required designating soldiers to detain and search intruders, a sizeable element to overwatch the checkpoint, air cover on station, mobile mortar support, and a quick reinforcement force of TOW and infantry carriers that could extract or reinforce the flying checkpoint.
LESSON(s):
- Be imaginative while operating in an OOTW; develop tactics, techniques, and procedures (TTP) that can be applied to anticipated situations.
- Ensure that checkpoints are designed so that only the minimum number of soldiers are exposed at any given time and that they are overwatched by automatic weapons when they are exposed.
- Make reinforcement and counterattack plans and rehearse them.
- Develop situational exercises to train soldiers on how to conduct checkpoint procedures. Included are a few examples of these situational exercises:
SITUATION | RESPONSE (A TECHNIQUE) |
---|---|
Receive Sniper Fire | Take cover: employ smoke, protect wounded; identify location of sniper; REPORT; respond IAW ROE. |
Projectiles Thrown | REPORT; protect self/others; do not throw objects back. |
Imminent Harm | Protect yourself/others; use force IAW ROE; REPORT. |
Civilian Casualty | REPORT; provide first aid. |
Drive-By Shooting | Take cover; REPORT; respond with force IAW ROE. |


NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|